Security News > 2024 > May > Europol identifies 8 cybercriminals tied to malware loader botnets
Operation Endgame, announced by Europol yesterday, led to the seizure of 100 servers used in multiple malware operations, including IcedID, Pikabot, Trickbot, Bumblebee, Smokeloader, and SystemBC. The law enforcement crackdown also involved four arrests, one in Armenia and three in Ukraine.
Yesterday, the Federal Criminal Police Office of Germany revealed the identities of eight cybercriminals of Russian descent, who are thought to have held central roles in the Smokeloader and Trickbot malware operations.
Fedor Aleksandrovich Andreev: Known by aliases "Azot" and "Angelo," is a 37-year-old Russian male who played a significant role in the "Trickbot" group, initially testing malware and later leading a team.
Georgy Sergeevich Tesman: Using the alias "Core" the 25-year-old Russian contributed to the "Trickbot" group's activities by acting as a crypter, ensuring malware evasion from antivirus detection.
Nikolai Nikolaevich Chereshnev: Known by the alias "Biggie," the 34-year-old Russian was involved in maintaining the VPN infrastructure for the "Trickbot" group and later acted as a crypter to ensure the malware remained undetected.
Police seize over 100 malware loader servers, arrest four cybercriminals.
News URL
Related news
- AndroxGh0st Malware Integrates Mozi Botnet to Target IoT and Cloud Services (source)
- Cybercriminals Use Excel Exploit to Spread Fileless Remcos RAT Malware (source)
- Volt Typhoon rebuilds malware botnet following FBI disruption (source)
- Botnet exploits GeoVision zero-day to install Mirai malware (source)
- Cybercriminals used a gaming engine to create undetectable malware loader (source)
- Cybercriminals Exploit Popular Game Engine Godot to Distribute Cross-Platform Malware (source)
- BadBox malware botnet infects 192,000 Android devices despite disruption (source)